U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Keyword (text search): cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 720 matching records.
Displaying matches 141 through 160.
Vuln ID Summary CVSS Severity
CVE-2023-28549

Memory corruption in WLAN HAL while parsing Rx buffer in processing TLV payload.

Published: September 05, 2023; 3:15:13 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28548

Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART.

Published: September 05, 2023; 3:15:13 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28544

Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers.

Published: September 05, 2023; 3:15:13 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28538

Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region.

Published: September 05, 2023; 3:15:13 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21667

Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.

Published: September 05, 2023; 3:15:13 AM -0400
V4.0:(not available)
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-21664

Memory Corruption in Core Platform while printing the response buffer in log.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21663

Memory Corruption while accessing metadata in Display.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21662

Memory corruption in Core Platform while printing the response buffer in log.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21655

Memory corruption in Audio while validating and mapping metadata.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21654

Memory corruption in Audio during playback session with audio effects enabled.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21653

Transient DOS in Modem while processing RRC reconfiguration message.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-21646

Transient DOS in Modem while processing invalid System Information Block 1.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-21644

Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21636

Memory Corruption due to improper validation of array index in Linux while updating adn record.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-40534

Memory corruption due to improper validation of array index in Audio.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-40524

Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.

Published: September 05, 2023; 3:15:12 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-33275

Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range.

Published: September 05, 2023; 3:15:11 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-33220

Information disclosure in Automotive multimedia due to buffer over-read.

Published: September 05, 2023; 3:15:11 AM -0400
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28577

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

Published: August 08, 2023; 6:15:14 AM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28576

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Published: August 08, 2023; 6:15:14 AM -0400
V4.0:(not available)
V3.1: 7.0 HIGH
V2.0:(not available)